Network Assessment Snapshot
Your Network Assessment Snapshot
A network assessment is a snapshot of your existing IT infrastructure, compliance, security, and management of your network’s components. When an organization is uncertain of its network’s strength or risk, a network assessment snapshot is vital to gain valuable insight into the health and state of your IT infrastructure. The assessment snapshot also gives insight into areas that need improvement, which future-proofs your business’s IT infrastructure.
What Do We Need to Perform a Network Assessment Snapshot?
Access to Server
On-site server with an active directory to assess all security measures and policies
Temporary admin credentials to the domain to access the domain.
Get your results!
We’ll need 30 minutes of your time to review our findings and make a recommendation.
What You'll See In Your Network Assessment Snapshot
HIGH RISK SCORE: YOUR NETWORK IS IN DANGER
Network Risk and Issue Score
The Risk Score is a value from 0 to 100, where 100 represents significant risk and potential issues. The risk score is associated with the highest risk issue. During the network assessment snapshot, we will be able to identify critical issues. The risk score should act as a grounding point for your network security action plan.
Security Risk Report
Based on general industry-wide best practices, the security risk report may indicate existing issues or points of interest. The Issue Score grades the level of issues in the environment. An Issue score of zero (0) means no issues were detected in the environment. It may not always be possible to achieve a zero score in all environments due to specific circumstances.
Book Your FREE Network Assessment Snapshot Consultation!
What Do We Most Commonly See In Network Assessment Snapshots?
Anti-Spyware and Malware Out-of-Date
Up to date anti-spyware definitions are required to properly prevent the spread of malicious software. Some anti-spyware definitions were not found to be up to date.
User accounts with passwords never set to expire present a risk of use by unauthorized users, They are more easily compromised than passwords that are routinely changed
Unsupported Operating Systems
Computers found using an operating system that is no longer supported. Unsupported operating systems no longer receive vital security patches and present an inherent risk.
When a computer hasn’t been checked into for over thirty days. the computer runs the risk of becoming an unauthorized entry point to your network. This can potentially compromise your data.
Computers found using a version of Microsoft Office that is no longer supported. Unsupported software no longer receives vital security patches and presents an inherent risk.